Security News > 2024 > May > Europol identifies 8 cybercriminals tied to malware loader botnets
Operation Endgame, announced by Europol yesterday, led to the seizure of 100 servers used in multiple malware operations, including IcedID, Pikabot, Trickbot, Bumblebee, Smokeloader, and SystemBC. The law enforcement crackdown also involved four arrests, one in Armenia and three in Ukraine.
Yesterday, the Federal Criminal Police Office of Germany revealed the identities of eight cybercriminals of Russian descent, who are thought to have held central roles in the Smokeloader and Trickbot malware operations.
Fedor Aleksandrovich Andreev: Known by aliases "Azot" and "Angelo," is a 37-year-old Russian male who played a significant role in the "Trickbot" group, initially testing malware and later leading a team.
Georgy Sergeevich Tesman: Using the alias "Core" the 25-year-old Russian contributed to the "Trickbot" group's activities by acting as a crypter, ensuring malware evasion from antivirus detection.
Nikolai Nikolaevich Chereshnev: Known by the alias "Biggie," the 34-year-old Russian was involved in maintaining the VPN infrastructure for the "Trickbot" group and later acted as a crypter to ensure the malware remained undetected.
Police seize over 100 malware loader servers, arrest four cybercriminals.
News URL
Related news
- Cybercriminals used a gaming engine to create undetectable malware loader (source)
- Cybercriminals Exploit Popular Game Engine Godot to Distribute Cross-Platform Malware (source)
- BadBox malware botnet infects 192,000 Android devices despite disruption (source)
- Malware botnets exploit outdated D-Link routers in recent attacks (source)
- MikroTik botnet uses misconfigured SPF DNS records to spread malware (source)